Growing concern about deep-fake videos will make it increasingly important to be able to demonstrate the integrity of video evidence, warns South Korea’s largest in-country video tech manufacturer IDIS. Rapid advances in digital video manipulation techniques, and a rise in alleged deep-fake celebrity videos being reported in the news, will put pressure on both video tech users and on prosecutors to demonstrate the integrity of any footage they use. Internal disciplinary proceedings &ldq...
Ping Identity, the Intelligent Identity solution for the enterprise, announced Project COVID Freedom which leverages its recent acquisition of ShoCard personal identity to allow healthcare providers, businesses, and individuals to easily share proof of COVID test results and vaccinations. Project COVID Freedom creates a secure and privacy enabled way for healthcare providers, businesses, and individuals to verify test and vaccination results, while keeping users up to date on vaccination status...
Workforce management specialist, Synel Industries UK (Synel UK), has introduced the latest version of Synergy Access, a cloud-based access control solution which provides a scalable and cost-effective way to manage who is allowed access to restricted areas. Available as a stand-alone solution or as part of a wider suite of software from Synel that includes Time and Attendance and other workforce management modules, Synergy Access is designed to provide a future-proof solution for access control...
Honeywell, a global provider of connected buildings, and IDEMIA, a global provider of Augmented Identity, announced a strategic alliance to create and cultivate an intelligent building ecosystem that provides a more seamless and enhanced experience for operators and occupants alike. The alliance will integrate Honeywell’s security and building management systems with IDEMIA’s biometric-based access control systems to create frictionless, safer and more efficient buildings. The Honey...
The need for safer and more touchless ways to pay has escalated and consumers are embracing contactless cards as the preferred means of payment, with 77% using them regularly in-store. However, in parallel with the increased use of contactless are rising security and usability concerns. The pandemic has rapidly changed the way one pays and their attitudes towards how they want to pay in the future. “PIN codes have been annoying for a long time, but who would have thought a year ago that o...
Third Millennium is pleased to announce the launch of a flush-mounted Ligature Resistant reader. The RX5M is a Third Millennium styled flush-mounted Ligature Resistant reader. The unit is a multi-technology reader suitable to interface with all standard access control systems. This unit offers impact-resistant construction with a high degree of protection against vandalism and malicious attack. Quick and easy installation The stainless-steel flush fit assembled housing may be secured to a re...
Third Millennium is pleased to announce the launch of a flush Panel Mount reader. The RX5 is a Third Millennium styled flush Panel Mount reader. The unit is a multi-technology reader suitable to interface with all standard access control systems and may be used in speed gates and turnstiles or other third-party enclosures. Having provided readers with turnstiles and speed gates for many years, this is the first product specifically designed for this market. Contactless entry Steve Greenaway, Business Manager, said “We have provided readers for turnstiles and speed gates for many years, but this is the first product that we have designed specifically for this market.” “Offering true contactless entry is ever more important, and this demonstrates our commitment to constantly review and develop our products, and to provide the safest possible solution at the main point of entry.”
Sargent and Greenleaf (S&G), a global manufacturer of high security locks and locking systems, announces the official launch of their innovative new I-Series Keypad, one of the industry’s first and only keypad offering secure, instant upgrades. With this future-proof design, the new I-Series Keypad replaces standard safe lock keypads with ease of installation and enhanced features for total control and flexibility. “For too long, security has followed a predictable path,” commented Mark LeMire, S&G CEO. “It’s time to strike out in a new direction with products designed to answer end-user needs now and well into the future.” Biometric and network solutions An updated, brushed black aluminum casing houses a biometric finger scan and user-friendly LCD touchscreen “The new I-Series Keypad reflects an industry-wide growing demand for biometric and network-enabled solutions and gives the end user instant access to the latest and greatest all-inclusive security solutions,” said Devon Ratliff, S&G director of engineering. “As needs evolve, this keypad evolves right with them, placing full control of their safe security directly into the hands of the end user.” Features/benefits of the S&G I-Series Keypad: Future-proof design - Designed to fit today’s intuitive user experience and support ongoing enhancements, the I-Series Keypad fits standard safe lock keypad footprints with a modern, streamlined aesthetic. An updated, brushed black aluminum casing houses a biometric finger scan and user-friendly LCD touchscreen, with proven impact-resistance and durability. The screen exceeds UL impact protocol, resulting in a keypad that is built to last. Instant upgrades - Through the S&G secure mobile app with advanced encryption, consumers, banks, and businesses possess the real-time, leading-edge security of instant upgrades. Features and functionality are customisable and immediate. No more waiting on equipment or costly physical upgrades. Audit and encryption features Empowering modern markets - The I-Series Keypad supports three methods of entry: touchscreen keypad, biometric finger scan, or touch-free mobile app. Flexibility renders the I-Series ideal for a wide range of applications: financial institutions searching for high-security options will appreciate the advanced audit and encryption features and instant access to the latest security upgrades; businesses benefit from the low-touch entry and high-durability construction, along with the significant time and resource savings delivered via instant field upgrades; and for consumers seeking to upgrade to a more modern look, the I-Series Keypad offers an understated aesthetic and sleek functionality to fit today’s smart homes. Security Reimagined - With a renewed commitment to quality and innovation, the S&G new forward-thinking solutions are designed to meet customer needs now and also keep products relevant for the future. Every solution is carefully designed and rigorously tested against international standards to deliver even greater value over time. Biometric fingerprint entry “That’s our promise,” LeMire added. “We keep an eye on what’s ahead, so our customers stay secure.” One of the first and only safe lock on the market that allows in the field-Instant upgrades with enhanced features for total control and flexibility. Available in matte black finish and will be sold separately or with 6 lock body options. Features Include: Network & Bluetooth connectivity allows for instant upgrades at any time Premium LCD screen - scratch & fingerprint resistant display exceeds UL impact testing standards Impact-resistant design and tough metal casing for enhanced durability Three (3) Secure, flexible entry access methods - Touchscreen Code Entry, Biometric Fingerprint Entry, and S&G Mobile App Entry User-friendly screen with clearly visible numbers that illuminate for day and night usage Easy push-button cover removal for battery change Quick & Easy Installation - Installs in minutes with only a standard screwdriver and fits standard keypad footprints. No drilling is needed.
Bosch Security Systems has released version 4.8 of its Building Integration System (BIS) which offers safe, touchless access control solutions to curb the spread of viruses like Covid-19. Secure access control solution BIS 4.8 supports biometric and mobile device authentication and provides building managers enhanced integration of fire panels and intrusion panels to ensure the security of buildings. The global COVID-19 pandemic has caused building operators to rethink their access control solutions In light of the global COVID-19 (coronavirus) pandemic, building operators need to rethink their access control solutions. Instead of systems that require physical touch and thereby increase the risk of virus transmission, contactless solutions that still meet the highest security guidelines are preferable. BIS 4.8, Building Integration System In response to these requirements, BIS 4.8 expands on the trusted features and benefits of version 4.7 to now work with three different touchless solutions that safeguard personal health: Face recognition - BIS 4.8 has been redesigned to work with the face recognition solution from Idemia. The face recognition device obtains a biometric scan from a safe distance and matches facial features with credentials in an encrypted database. Doors and gates open via the BIS Access Engine and the Bosch Access Modular Controller (AMC2). Touchless fingerprint readers - Integrated with Idemia’s Morphowave reader, BIS 4.8 controls access via a touchless fingerprint scan. A simple wave of the hand in front of the touchless sensor triggers a 3D scan of four fingers. Access rights are confirmed within less than one second by the system's fingerprint database for a clean and highly secure solution. Access via mobile phones - In conjunction with the mobile access control solutions from STid and HID, BIS 4.8 allows users to use their mobile phone instead of a card for access at the secure reader. For STid’s Mobile ID, the method requires a STid reader, while a Bosch Lectus secure reader works with HID’s Mobile Access solution. Users only need to install an app to verify access rights and use the safe, wireless technology. Aside from facilitating contactless access, all three solutions are also intuitive, quick and convenient compared to keycards and similar methods as there is no need to carry an access card or remember a password in order to gain entry to a building or area. Seamless fire and intrusion panel integration Combining BIS 4.8 with Bosch B and G Series intrusion panels unlock a new level of convenience Combining BIS 4.8 with Bosch B and G Series intrusion panels or MAP 5000 panels unlocks a new level of convenience. Users require only one authorisation badge to control two systems. Disarming areas of the intrusion system and granting access can be realised with the same badge on the same reader, without entering a PIN code for easy, one-step authorisation. Improved flexibility and efficiency With the introduction of version 4.8, BIS continues to unify the management of multiple security and safety domains and maximise flexibility for key customer requirements. New features include: Integration of the latest Bosch Avenar 2000 and 8000 fire panels and peripherals, along with command and control via BIS, with devices and status shown on maps, and events managed more intuitively via an alarm list. User authorisation for Bosch B and G Series intrusion panels are managed directly within BIS for up to 2,000 users on as many as 25 intrusion panels, instead of handling authorisations separately on each of the 25 panels. Central overview of all existing access and B and G Series intrusion authorisations for the complete installation within one system. With these updates, BIS 4.8 helps operators meet the health and safety demands of the new reality without compromising on functionality and security. As a centralised platform for operational building management, the new version of BIS offers greater convenience, flexibility, and efficiency.
The greatest challenge that the energy sector faces in modern times is how to meet the continuously changing risk factors and addressing all of the necessary security aspects. Considering their unique infrastructure, expensive and sensitive materials onboard, and sometimes even classified national assets, energy facilities and critical infrastructures will always be subject to varied security threats. With hundreds of oil refineries, nuclear power plants, research reactors and fuel cycle facilities in operation worldwide, preventing certain materials from falling into the hands of adversaries or threat elements who seeks to steal or even harm the station operators is the top priority of the corporations’ security teams. Use of explosive devices in energy sector attacks The overwhelming majority of attacks (74%) on energy targets, between 2010 and 2014, were carried out by the use of explosive devices, while facility and infrastructure attacks, including arson and sabotage tactics, were the second most common (CEI Security Stakeholder Group Manifest). In April 2013, terrorists used high-powered rifles to destroy several transformers at a transmission substation in California in an incident that incurred more than US$ 15 million in damages and required nearly a month to restore. Robust layer-upon-layer security network Energy plants are among North America’s most protected private sector facilities Still, energy plants are among North America’s most protected private sector facilities. They are extremely robust structures that, by design and construction, are very challenging to penetrate. These structures, a well-trained security force and strict access controls for operators and visitors provide a robust layer-upon-layer comprehensive security network. The security level increases as one gets closer to the ‘owner-controlled area’, which is fenced and secured by advanced systems and well-armed security officers. This security ring typically shields the reactor, the control room, the used fuel pool and the central security alarm stations. The systems provide: High-quality scanned images, Smart compare capabilities for the inspection of recurring vehicles, Fraud prevention tools backed by a unique vehicle ID, Full integration to barriers, bollards and access control systems, Automatic detection of illicit materials or unauthorised access on the first pass, COVID-19 compatible: Driver and passenger fever detection capabilities. Helios UVIS by UVeye Access to the owner-controlled area should be limited and protected by an automated access control system that integrates with the alarmed security doors and response system connected to federal or local law enforcement agencies, which can assist in the event of an attack. Helios UVIS by UVeye helps ensure that all measures are taken to control vehicles’ access to sensitive energy facilities and protect them from such risks. Helios UVIS is designed to detect illicit materials being smuggled in, prevent theft, and thwart unauthorised access or other malicious acts in and around the secured facility. UV Inspect, advanced vehicle pass solution UV Inspect can be used for vehicles that have not been previously scanned by a system Offering single- or multi-lane units, as well as stationary or mobile units, UVeye’s advanced deep learning algorithms were developed through training with millions of vehicles and allow UVeye to offer its first pass solution, UV Inspect. Built on a truly intimate understanding of what a wide range of vehicles are supposed to look like in various environmental conditions, UV Inspect can be used for vehicles that have not been previously scanned by a system. UVeye is the only under-vehicle inspection system (UVIS or UVSS) vendor to offer a verified first-pass solution that significantly increases security teams’ effectiveness. UV Compare, license plate or fingerprint ID recognition Another key feature from Helios is called UV Compare, which enables it to recognise previously scanned vehicles by their license plate or unique undercarriage fingerprint ID, and compare it to previous scans. Individuals who are granted access to the facility or protected area, whether they are employees, contractors or visitors, become part of this database. This feature can also help detect tiny objects such as paper bags, phones, miniature hard disks and other contraband. Securing confidential materials Due to their complex environment and sensitive information, energy sites are a target for technology and data theft scenarios. The physical protection of energy plants and associated facilities must include vehicle access point inspection to ensure these security systems’ effectiveness against defined risk factors by UVeye’s tailored security level, answering a wide range of security requirements. Given the industry’s unique work conditions and the varied types of vehicles accessing these facilities, Helios can withstand up to 40,000 pounds (20 tons) per axle, meaning that it will survive being driven over by even massive vehicles like trucks or SUVs. Durable with built-in thermal sensor Helios is also designed to respond to weather variation, such as daily changes in temperature Helios is also designed to respond to weather variation, such as daily changes in temperature, storms and weather hazards. It is fully operational at temperatures between 68°F and 104°F (20° and 40° Celsius) and is IP 68/54 compliant, meaning it offers full protection against sand, dust and rain. UVeye’s built-in thermal sensor can detect the body temperatures of the passengers in vehicles entering the site’s access roads, assuring the safety and security of everyone in and around the facility. Multi-layer access control security UVeye fully supports third-party integration and provides multiple layers of security for any facility. Integrations available and made in the past include: ALPR System Face Detection/Recognition Arm Barriers/Bollards VMS (Video Management System) Centralised data management system Centralised management system allows the client to access multiple systems and manage historical data Integrating to the centralised server provides the capability of connecting multiple systems or lanes across different sites, while also enabling central management and control via one screen. The centralised management system allows the client to access multiple systems and manage the other users and historical data. The undercarriage is one of the most critical parts of the vehicle to inspect and one of the most challenging areas to examine. Helios is the perfect solution to prevent any weapons or other illegal and dangerous items from entering energy facilities. Enhanced data security Integrating it with additional security and access control systems can provide a multi-layered approach to tighten the entry and exit points to any sensitive site while keeping personnel and data safe.
Iris ID, a pioneering provider of iris recognition technology, announced the compatibility of its iCAM M300 handheld, multi-modal biometric reader and the MozaicID iCAM M300 smartcard software credential application. This application enables the mobile device to accommodate a range of Personal Identity Verification (PIV) compatible credentials including PIV Interoperable (PIV-I) and the Transportation Worker Identification Credentials (TWIC), a smartcard used by workers requiring access to secure areas of U.S. maritime facilities and vessels. Secured identity authentication The MozaicID app uses the iCAM M300’s detachable FBI-certified Sherlock fingerprint sensor from Integrated Biometrics to authenticate workers’ identities by comparing a live fingerprint to a stored template embedded in the credential. The application will also check the trust status of the presented credential. The iCAM M300 also enables mobile enrolment of workers with its embedded camera simultaneously capturing both iris and facial modes for contactless identity authentication. Authorities statement Mohammed Murad, vice president of global sales and business development, Iris ID, said compatibility with the MozaicID app adds to the versatility of the iCAM M300. “Iris ID and MozaicID have combined best of breed technologies to create an accurate and more secure means of identifying maritime employees wherever their jobs take them,” he said. “The iCAM M300 provides an unparalleled intuitive user interface, which makes the process easier for the user and operator.” Jim Parroco, chief executive officer of MozaicID said “MozaicID is dedicated to providing effective, relevant and user-friendly security solutions. We institute intuitive and innovative technology in our software with proven results. The product offering, we have with Iris ID provides an excellent security solution in response to a specific need.” Features and benefits Supports other contact or contactless Personnel Identity Verification (PIV) smartcards such as Common Access Cards (CAC) used by military, civilian and vendor employees in controlled government spaces Commercial Identity Verification (CIV), used by commercial organisations to meet federal government access control standards Comes equipped with software development kits (SDK’s) ready to deploy a wide variety of Android-based identity application Organisations requiring remote identity verification, such as the U.S. Customs and Border Patrol and law enforcement departments, use the water- and dust-resistant iCAM M300 Provides magstripe and contactless card support, as well as an MRZ reader to verify ePassports Communications protocols include NFC, Wi-Fi, Bluetooth, GPS, 4G LTE
SAFR from RealNetworks, Inc. announces improved face detection and recognition accuracy for both masked and unmasked faces with the release of SAFR 3.0. Available now, SAFR’s 3.0 release introduces a new default high sensitivity face detector. Customers running the high sensitivity face detector will see a 95.1% detection rate and 98.85% recognition accuracy rate for faces covered by PPE face masks — including non-surgical fabric masks of varying patterns — in surveillance-style videos of faces in motion. Contactless secure access Detection efficiency has also been improved when multiple faces are simultaneously in the field of view Detection efficiency has also been improved when multiple faces are simultaneously in the field of view to ensure detection and recognition speeds remain high. “With the 3.0 release, SAFR continues its track record of maintaining high-accuracy under challenging real-world conditions, including the new norms brought by this global pandemic.” “SAFR’s accuracy improvements will enable customers to deploy face-based contactless secure access without requiring removal of PPE and ensure persons of interest and registered VIPs don’t go unrecognised while wearing face masks,” said Brad Donaldson, VP Computer Vision, SAFR. Facial recognition service SAFR 3.0 also includes a new mask detection dashboard that enables customers to anonymously track mask usage rates and view and filter by age, gender, location, and time. This dashboard joins the existing occupancy and traversal dashboards available in the SAFR web console. “NTT DOCOMO provides facial recognition service with RealNetworks to the Japanese market. With SAFR’s new functionalities, and in particular the new mask detection feature, we believe that we can enhance the safety and security of people and organisations. We will continue to work with various partners to create new value-added solutions to help solve social issues,” said Hisakazu Tsuboya, Senior Vice President, General Manager of 5G & IoT Business Department, NTT DOCOMO, INC.
In a world forever changed by the coronavirus pandemic, companies worldwide are now expanding their concept of physical security to best safeguard their facilities and employees. Few incidents have had as much of an impact on businesses globally as the COVID-19 pandemic; much of the world is still struggling to contain COVID-19, navigating the lasting effects and exploring what the “new normal” looks like. While some organisations are still engaged primarily in “anywhere operations”, i.e. remote work, many organisations are implementing strategic physical security solutions that better protect everyone through the use of video surveillance technology and advanced intelligence capabilities. As this new normal takes hold within the business environment, security strategies will largely be centered around several key initiatives like access control, people counting, occupancy controls, temperature screening, contact tracing, and reducing office touch points. With the use of a video management system (VMS) in the shadow of COVID-19, occupancy data from a VMS can trigger a lockdown and not permit new entrants until the occupancy drops below a certain threshold; this is significantly useful for organisations that have returned to in-person work. But there’s a caveat: though many legacy security systems are being re-evaluated to allow for touchless or frictionless access control — a move designed to eliminate the need for employees and visitors to physically touch a surface when using an access control system — upgrading the outdated technologies can be cumbersome and expensive, especially for organizations that had not planned for an interruption like the pandemic. Security contractors will be vital So, what is the solution? Security contractors will play a vital role in helping end-users across a range of vertical markets — large and small — to achieve their goals in the new paradigm. For some, this may mean leveraging existing access control and video surveillance systems with upgrades where needed. For others, an entire overhaul is made possible with budget friendly solutions for businesses to migrate to integrated access control through end-to-end security solutions that tie into existing infrastructures without major disruptions (meaning the organisation will never be left vulnerable). Cybersecurity is becoming even more intertwined with physical security There is massive transformation occurring in the security industry, most notably the movement to digitise physical access and integrate it with video management systems and surveillance. This shift means that cybersecurity is becoming even more intertwined with physical security, allowing organisations the ability to correlate the metadata of people’s behaviors and activities — a plus point for those looking to remain vigilant against future pandemic-esque business interruptions. Access, video, and audio are converging into consolidated platforms. Due to lower costs and pairings with IP-based, wireless infrastructure, there are infinite solution configurations. IT security requirements are beginning to apply to physical security because of this integrated infrastructure. Multi-factor authentication The security industry is also beginning to see a trend of multi-factor authentication, which is going to dominate in the days to come as it makes solutions more reliable. Most people carry smartphones these days, which have green check communication capabilities that allow easy multi-factor authentication. Costs are going down, and algorithms are getting better, making more people willing to try it. Some new solutions have both the fingerprint reader and a camera for facial biometrics Some new solutions have both the fingerprint reader and a camera for facial biometrics. Cameras and CCD modules cost almost nothing, and they do not have to be super high-end anymore, especially if organisations are doing one-to-one verification. It’s not just about security now; it is security, health, and safety. Access control with video, intelligent readers, and credentials is a perfect platform for next generation solutions.
Recently contacted by your credit card company because of a data breach or were you a victim of identity theft? Many of us have either been affected by identity theft or know someone who has been affected. Many consumers are seeking a secure environment that is also user-friendly. Businesses are seeking the same, with absolute certainty, that only valid users can access critical data. How can your company tackle these security and usability requirements while ensuring customer satisfaction? Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknesses but due to the global COVID-19 pandemic, touchless is highly preferred. Any company claiming their technology is best for all applications is likely being disingenuous. The key is to first prove a biometric is required, and once decided, the following five steps will help select the best biometric modality and supplier. Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknessesBiometrics can provide a mechanism to tackle these issues head-on by moving from what you know (password) and have (ID card) to who you are (your biometric), which dramatically increases the level of security while also being user-friendly. But how is the best biometric modality selected for an upcoming product? User interaction Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as well as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Biometric storage Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as Due to the global COVID-19 pandemic, touchless is highly preferredwell as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Cost and security Start by selecting which product lines will use the biometric and establishing the desired price point(s). Decide how the biometric will fit into the product and get bulk pricing to understand unit costs at volume. Software is typically handled as a license fee and often negotiable. The production cost per unit decreases as volumes increase. Choose the biometric modality that best meets functional and security requirements while hitting the targeted price. The biometric security level required depends on the assets being protected and the matching usage model. A 1:1 model, such as a cellphone, may be fine with a low-security biometric application. However, in a 1:N model, such as airport security, requires a more secure biometric such as iris. To select the best biometric for the product, compare each company's false acceptance rate (FAR) and false rejection rate (FRR). FAR indicates the biometrics ability to keep intruders out, while FRR indicates the biometrics ability to allow enrolled users in. Ensure that all biometric companies being considered can provide this information at a minimum. It is better to get each company's detection error trade-off (DET) curve, which shows how FAR and FRR vary relative to each other. Criminal activity Hackers and criminals are always trying to break technology, including biometrics. Be certain each technology has robust presentation attack detection (PAD), which ideally is third-party certified. Understand what if any personally identifiable information (PII) needs to be captured, and decide how the PII will be handled, including who will manage the data (i.e., your company, the biometric supplier or another third party). Be certain that whoever controls the PII uses the latest encryption standards and employs techniques to secure this data in memory, crossing the network and in the biometric database. Understanding the European GDPR Compliance standards if applicable will also be important. Supplier consideration Each supplier being considered should be evaluated throughout the POC testing process. Ensure the supplier is trustworthy, provides good customer support and meets its commitments. Evaluate the supplier's engineering capability and support model to ensure it can support any desired design changes and support your Be certain each technology has robust presentation attack detection (PAD)engineers to deliver the best functioning product. Selecting the best biometric for your exact use case will take some time and effort, but it has the potential to grow your business and delight your customers. Do not shortchange the process and go with the cheapest solution without doing some research. As the saying goes, you get what you pay for.
News reports and opinion columns about face recognition are appearing everyday. To some of us, the term sounds overly intrusive. It even makes people shrink back into their seats or shake their head in disgust, picturing a present-day dystopia. Yet to others, face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crime. What are the facts about face recognition? Which side is right? Well, there is no definitive answer because, as with all powerful tools, it all depends on who uses it. Face recognition can, in fact, be used in an immoral or controversial manner. But, it can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence. Concerns of facial recognition With the increased facial recognition applications, people’s concerns over the technology continuously appear throughout news channels and social media. Some of the concerns include: Privacy: Alex Perry of Mashable sums up his and most other peoples’ privacy concerns with face recognition technology when he wrote, “The first and most obvious reason why people are unhappy about facial recognition is that it's unpleasant by nature. Increasing government surveillance has been a hot-button issue for many, many years, and tech like Amazon's Rekognition software is only making the dystopian future feel even more real”. Accuracy: People are worried about the possibilities of inaccurate face detection, which could result in wrongful identification or criminalisation. Awareness: Face recognition software allows the user to upload a picture of anyone, regardless of whether that person knows of it. An article posted on The Conversation states, “There is a lack of detailed and specific information as to how facial recognition is actually used. This means that we are not given the opportunity to consent to the recording, analysing and storing of our images in databases. By denying us the opportunity to consent, we are denied choice and control over the use of our own images” Debunking concerns The concerns with privacy, accuracy, and awareness are all legitimate and valid concerns. However, let us look at the facts and examine the reasons why face recognition, like any other technology, can be responsibly used: Privacy concerns: Unlike the fictional dystopian future where every action, even in one’s own home, is monitored by a centralised authority, the reality is that face recognition technology only helps the security guard monitoring public locations where security cameras are installed. There is fundamentally no difference between a human security guard at the door and an AI-based software in terms of recognising people on watchlist and not recognising those who are not. The only difference is that the AI-based face recognition software can do so at a higher speed and without fatigue. Face recognition software only recognises faces that the user has put in the system, which is not every person on the planet, nor could it ever be. Accuracy concerns: It is true that first-generation face recognition systems have a large margin for error according to studies in 2014. However, as of 2020, the best face recognition systems are now around 99.8% accurate. New AI models are continuously being trained with larger, more relevant, more diverse and less biased datasets. The error margin found in face recognition software today is comparable to that of a person, and it will continue to decrease as we better understand the limitations, train increasingly better AI and deploy AI in more suitable settings. Awareness concerns: While not entirely comforting, the fact is that we are often being watched one way or another on a security camera. Informa showed that in 2014, 245 million cameras were active worldwide, this number jumped to 656 million in 2018 and is projected to nearly double in 2021. Security camera systems, like security guards, are local business and government’s precaution measures to minimise incidents such as shoplifting, car thefts, vandalism and violence. In other words, visitors to locations with security systems have tacitly agreed to the monitoring in exchange for using the service provided by those locations in safety, and visitors are indeed aware of the existence of security cameras. Face recognition software is only another layer of security, and anyone who is not a security threat is unlikely to be registered in the system without explicit consent. The benefits In August 2019, the NYPD used face recognition software to catch a rapist within 24 hours after the incident occurred. In April 2019, the Sichuan Provincial Public Security Department in China, found a 13-year-old girl using face recognition technology. The girl had gone missing in 2009, persuading many people that she would never be found again. Face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crimeIn the UK, the face recognition system helps Welsh police forces with the detection and prevention of crime. "For police it can help facilitate the identification process and it can reduce it to minutes and seconds," says Alexeis Garcia-Perez, a researcher on cybersecurity management at Coventry University. "They can identify someone in a short amount of time and in doing that they can minimise false arrests and other issues that the public will not see in a very positive way". In fact, nearly 60% Americans polled in 2019 accept the use of face recognition by law enforcement to enhance public safety. Forbes magazine states that “When people know they are being watched, they are less likely to commit crimes so the possibility of facial recognition technology being used could deter crime”. Saving time One thing that all AI functions have been proven to achieve better results than manual security is speed. NBC News writes, “Nearly instantaneously, the program gives a list of potential matches loaded with information that can help him confirm the identity of the people he’s stopped - and whether they have any outstanding warrants. Previously, he’d have to let the person go or bring them in to be fingerprinted”. Facial recognition can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence With AI, instead of spending hours or days to sift through terabytes of video data, the security staff can locate a suspect within seconds. This time-saving benefit is essential to the overall security of any institution, for in most security threat situations, time is of the utmost importance. Another way in which the technology saves time is its ability to enable employees (but not visitors) to open doors to their office in real time with no badge, alleviating the bottleneck of forgotten badge, keycode or password. Saving money A truly high-performance AI software helps save money in many ways. First, if the face recognition software works with your pre-existing camera system, there is no need to replace cameras, hence saving cost on infrastructure. Second, AI alleviates much of the required manual security monitoring 24/7, as the technology will detect people of interest and automatically and timely alert the authorities. Third, by enhancing access authentication, employees save time and can maximise productivity in more important processes. The takeaway AI-enabled face recognition technology has a lot of benefits if used correctly. Can it be abused? Yes, like all tools that mankind has made from antiquity. Should it be deployed? The evidence indicates that the many benefits of this complex feature outweigh the small chance for abuse of power. It is not only a step in the right direction for the security industry but also for the overall impact on daily lives. It helps to make the world a safer place.
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the current indecision lies the long-term impact of a possible change in trading status between the United Kingdom and continental Europe. Other issues include capital flow and labor mobility. Brexit uncertainty leading to security concerns Loss of shared information with the EU will make the UK less safe “Companies … are unclear about their future,” comments Martin Warren of the Institute of Chartered Accountants in England and Wales. “Companies are making decisions now about jobs, supply chains, headquarters and asset locations, incurring significant, and possibly unnecessary, cost and upheaval.” Warren fears the destructive effects of a ‘no deal’ outcome and hopes politicians will break the deadlock and restore business confidence. Security implications of Brexit extend beyond economics. Loss of shared information with the EU will make the UK less safe. Extradition across EU borders will be more difficult, and exchange of data such as fingerprints and vehicle registrations is at risk. The Irish border after Brexit is of particular concern to security professionals. Countering threat of international terrorism Robert Hall of London First and Alison Wakefield of Security Institute say the security impact of departing the EU will be long lasting and profound. “In security terms, the UK will still have to contend with international terrorism, transnational crime and the global movement of people, all challenges that require wide scale cooperation.” They add that leaving the EU will require “a significant investment in people, resources and databases to cope with the anticipated volumes of traffic through ports, airports and tunnels.” Analyst company IHS Markit earlier commented about the impact on the security industry of Brexit’s drag on the UK economy, “Access control, intruder and fire alarm markets typically track construction rates closely and are forecast to be affected most. However, a large cut to infrastructure spending would be just as damaging to the video surveillance market.” UK security companies prefer ‘soft exit’ from EU If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to WTO trade rules If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to World Trade Organisation (WTO) trade rules, which means tariffs on trade between the UK and the EU, says IHS Markit. There are five British-based access-control and intruder-alarm vendors supplying the European market in significant quantity – each with revenue exceeding $10 million. IHS Markit estimates these companies combined account for less than 10 percent of total European, Middle-Eastern and African (EMEA) market revenues for both industries. Uncertain future of UK security marketplace Asset protection specialist VPS Security Services has warned that the ongoing Brexit saga will likely lead to a rise in vacant commercial and residential properties as developers and investors are more reluctant to move forward with their UK real estate strategies. Seemingly endless machinations and shifting proposals are making the eventual outcome of Brexit very much a guessing game. Uncertainty translates into a volatile and changing outlook, and the eventual impact on the broader economy is an open question. As a reflection of that economy, the security marketplace will inevitably feel the economic impact, too, not to mention the new security challenges likely to ensue.
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple colour and infrared cameras that can detect facial features and confirm an identity. Real-time 3D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a real person that matches the stored facial image. System helps in tailgating mitigation Deep neural networks, powered by NVIDIA, enable the system to achieve new levels of frictionless access control, says Vince Gaydarzhiev, CEO of Alcatraz AI. Computer processing is achieved at the edge to ensure speedy and secure access control. We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction"“We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction,” says Gaydarzhiev. The accuracy of the system lessens the need for security guards, he says. The Silicon Valley startup, currently with 20 employees, was founded in early 2016 by a team from Apple, NVIDIA and Lily Robotics with a goal of targeting mid- to large-sized corporations that currently have deployed badging systems. The company has raised close to $6M from venture capital firms and individuals, and Johnson Controls/Tyco has invested in the startup. Alcatraz AI’s sensor device, mounted near a door, confirms a user’s identity and communicates the user’s badge number to the existing access control infrastructure. “The system improves the facial profile every time, using the neural network to be even more accurate in the future,” says Gaydarzhiev. He says it is the industry’s first “instant one-factor authentication for multi-person in-the-flow sensing.” The system is less expensive than previous facial authentication systems and does not require users to be very close to the reader Easy enrolment and deployment Enrolment in the system is easy. Companies can deploy a separate enrolment station, or any reader can be used for enrolment. After badging in a couple of times, the face matching system “enrols” the face with the associated badge number, thus allowing the user to dispense with the badge altogether. In the future, the frictionless system simply recognises the user and opens the door. A user company can quickly deploy the system at locations where thousands of employees have access, without requiring employees to go to HR for enrolment. Gaydarzhiev says accuracy of the system is no less than that of iris scanning, and the accuracy is configurable for specific needs. He says the system is less expensive than previous facial authentication systems and does not require users to be very close to the reader. Facial authentication is also more flexible than iris scanning or fingerprinting. Detecting intent from positioning of eyes The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionallyIn contrast to near field communication (NFC) or Bluetooth systems, the technology does not require a compatible smart phone or have issues of communication range. There is no need for users to stop and perform an action or gesture to signal intent. The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionally, says Gaydarzhiev. Alcatraz AI is targeting high-tech enterprises, including healthcare, government and eventually banks. Currently they have three pilot installations among large global software companies and are undergoing trials with some government agencies. Today, they sell direct to end users, but the intent is to develop a dealer channel that will account for most of the sales.
Activity slowed on the last day of ISC West in Las Vegas, but there was plenty of momentum remaining and plenty more to see. In the end, Reed Exhibitions declared 2018 the biggest and most successful year to date for the show. There were an additional 4,000 square feet of exhibit space compared to last year and a 6 percent growth in overall attendance, according to Reed. The cloud, biometrics, deep learning and other technologies were among the big topics at the show, and even smaller exhibitors were pleased with the results. In particular, emerging technologies were successfully highlighted. Cloud-based video systems Cloud video company Eagle Eye Networks announced multiple new offerings at ISC West. One was the first cloud-based video system that accommodates HD-over-coax cameras using the HD-TVI protocol to operate over existing coaxial cabling. In effect, cameras connect with an HD-TVI recorder, which plugs into Eagle Eye Networks’ on-site hardware “bridge” connecting to the Internet. Eagle Eye Networks has also integrated Hikvision body-worn cameras into their cloud system; transmitting video using the Eagle Eye Bridge ensures end-to-end encryption and the evidentiary integrity of the video. Analytics in the cloud can be turned on and off at will for each camera, and could be deployed over a weekend and switched off the following week “A few years ago, fewer customers were ready to adopt the cloud,” says Ken Francis, President of Eagle Eye Networks. “Now market adoption is changing, and customers don’t want on-site hardware. End-users are driving the move to cloud systems.” He estimates the evolution is about halfway complete, and Eagle Eye Networks continues to sign up new dealers every month because their customers are asking for the cloud. Eagle Eye Networks’ third new offering at ISC West is “analytics in the cloud,” including familiar analytics such as intrusion, people counting and loitering. Francis says the economics of the cloud make implementation of analytics much more affordable – about $4 per camera. Analytics in the cloud can be turned on and off at will for each camera. For example, analytics could be deployed over a weekend and then switched off the following week. “It’s a far more economically attractive and cost-effective service than on-site,” says Francis. the economics of the cloud make implementation of analytics much more affordable Augmented identity: biometrics in security Biometrics continue to make their way into the mainstream of the security market, and IDEMIA brought its message of “augmented identity” to ISC West. IDEMIA (formerly OT-Morpho) provides systems to the largest biometrics users in the world, including big customers such as the FBI and Interpol, and large-scale government projects around the globe. “If you can handle projects that big, enterprise applications are no problem,” says Gary Jones, Vice President, Global Channel & Marketing, Biometric Access & Time Solutions. He says that the company’s technologies apply to any vertical market, and they are especially common in major airports and big financial institutions, in addition to government. The company’s MorphoWave product allows users to wave their hand, and the system captures a three-dimensional shape of fingerprints. The touchless system is also “frictionless” -- it enables fast decision-making that promotes high throughput rates. Artificial intelligence applications AI and deep learning have been big topics of conversation at ISC West, and I saw a company on the last day of the show with a different take on the subject. BrainChip uses a type of AI called “spiking neural networking” that models the operation of neurons in the human brain - in contrast to “convolutional neural networks,” which use a series of math functions to train from pre-labelled data sets. The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects. Applications are in law enforcement, counter-terrorism and intelligence agencies.The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects “We search for specific things,” said Bob Beachler, Senior Vice President, Marketing and Business Development. The software can search hundreds of live or recorded camera feeds for a unique graphic pattern on an item of clothing or on a bag carried by a person, for example. The technology only requires modest processing power and consumes little energy, so it can be used with legacy systems without requiring hardware or infrastructure upgrades. Emerging Technology Zone A new Emerging Technology Zone at ISC West included participation by around 40 companies that are startups and/or new to the security industry. The section opened an hour before the main show floor and was located near the registration area, which increased traffic. “Generally speaking some people said it was hard to find, but I think it’s better for us as someone new to the market, rather than being on the main floor where you can get lost in the shuffle,” said Jeffrey Weiner, Vice President, Networks & Business Solutions, at Mersoft. “It was really smart that they opened this an hour earlier.” Mersoft, one of the Emerging Technology Zone exhibitors, has developed a software product to help the security industry do a better job of streaming live video. The software eliminates the startup delay and lag in live video. With dedicated software, video can be consumed by a browser or mobile app more easily Live video streaming “We accomplish that in two ways,” says Weiner. “One, we don’t trans-code the video into another format. Instead, we convert a security camera’s video from RTSP (real time streaming protocol) to WebRTC (Web Real-Time Communication), an open-source technology that has been used extensively in video conferencing, but not so much in security. The video can be consumed by a browser or mobile app more easily, and we don’t need a player on the client, which is another way we reduce lag.” Another advantage is that WebRTC is natively encrypted; every packet is encrypted. In contrast, applications that transmit RTSP have to be wrapped in a VPN (virtual private network) tunnel, which takes some effort to maintain and is a battery hog on a mobile device. Also, multi-casting of video is easier, even using streams of various resolutions. Mersoft works through partnerships, offering a cloud-hosted service on Amazon and a version that can be installed on a local server. They have worked with several DIY camera sellers (who use cloud services), and with some major commercial service providers. “A new partnership strategy we are exploring is with systems integrators, who can incorporate Mersoft and provide a differentiator by improving their video performance,” says Weiner. The 22-year-old company is new to security, and ISC West provides opportunities for in-depth conversations preparing for a future in the security sector. Customisable turnstile solutions Delta highlighted their new designer series turnstiles, whose colourful appearance led booth visitors to ask about customisation Even the smaller companies, located toward the back of the hall, were enthusiastic about ISC West this year. “The show has been great,” says Vanessa Howell, project manager of Delta Turnstiles. “We did get a lot of traffic. I am a niche product, so it’s not so much about quantity as quality [of leads]. I had great quality at the show.” Being away from competitors, which are grouped next to each other in the front of the hall, was an upside of the turnstile company’s booth location toward the back. Delta highlighted their new designer series turnstiles, whose colourful appearance led booth visitors to ask about customisation. “They ask: ‘Why are turnstiles only sold in basic models?’” says Howell. “’Why can’t they look like a piece of art since they are the first thing people see when they enter a building?’ People are very open to making them prettier.” Delta Turnstiles has been coming to ISC West since 2006. “I have manufacturer’s reps, and this is one of two times I get to see them in one place, and they bring a lot of customers to me at the booth,” says Howell. “This is my only face-to-face meetings with some customers. I speak mostly over the phone.” Valuable face-to-face engagement was a benefit of ISC West, and many of those meetings will likely set the stage for continuing successes in our vibrant market. Until next year.
Boon Edam Inc., a globally renowned company in security entrances and architectural revolving doors, has announced that Dexus Wholesale Property Fund has upgraded the Gateway Building in Sydney’s Circular Quay to feature entry security measures to protect employees, visitors and valuable data. The ideal solution was found by integrating Boon Edam Speedlane Swing optical turnstiles, IDEMIA’s MorphoWave touchless fingerprint scanners, Schindler’s elevator dispatch and Honeywell’s access control technology. Integration with MorphoWave touchless reader MorphoWave scans and verifies four fingerprints through a simple hand wave gesture Gateway’s access solution allows authorised and registered tenants to simply wave their hand in the MorphoWave touchless fingerprint scanner reader to enter the secure area through the turnstiles. Guests can sign in and register their finger pattern to become authorised to enter. MorphoWave scans and verifies four fingerprints through a simple hand wave gesture, during which the sensor takes several 3D photos of the fingerprints to extract biometric data and compare with the authorised fingerprints stored in the device. If they match, the user is granted access. This process all happens in less than one second. Featuring Schindler’s PORT Technology Each MorphoWave reader is connected to Schindler’s PORT Technology, which then receives the user’s credential data and conducts a cross-check with the building’s access control database. If the user is valid, a command is sent to the Boon Edam Lifeline Speedlane Swing to open its barriers. This interaction is surprisingly quick, with limited latency. “Tenants have a duty of care to protect their employees and visitors as well as valuable data and intellectual property, and they need the cooperation and support of a responsible and innovative building manager such as Dexus to manage secure entry into the building,” said Michael Fisher, Managing Director, Boon Edam Australia. Seamless access control integration A major part of the solution involves elevator destination control, whereby a user’s credentials are automatically assigned an elevator as they are verified and allowed access through the turnstile. This seamless integration was facilitated by an existing global partnership between Boon Edam and Schindler. The partnership arranged for Schindler’s PORT 4 mini technology to be embedded into the Speedlane Swing optical turnstiles at the manufacturing stage in the Boon Edam factory. Using an advanced algorithm and the integrated Schindler PORT 4 mini elevator destination control for visual and audio feedback, an elevator is automatically assigned, at the same time the turnstile is opening, allowing for optimum efficiency. The security is controlled by Honeywell’s access control system, integrated with Schindler’s PORT Technology. Honeywell access control system Honeywell has managed the security and building management systems for the Gateway building since 1990 Honeywell has been managing the security and building management systems for the Gateway building since it was first opened in 1990. Honeywell Asia-Pacific Solution Architect Leader Rhys Crabb said “Early engagement at all stages and a commitment to a collaborative approach enabled Dexus to select the best available technologies. Dexus placed customer outcomes first and foremost in the project brief, ensuring the delivery of a product that provided tenants and visitors with a premium, modern and secure user experience that is flexible and easy to use.” Boon Edam optical turnstiles Mr. Stephen Hodge, Senior Project Manager, Dexus, said “With so many stakeholders, and a strong need for reliability and quality, it was important that everyone knew the goals of the project and worked well together. I’m pleased to say that it was like a perfect jigsaw and everything came together smoothly." Stephen adds, “What was important to Dexus is that we were pushing the boundaries to create better experiences, but we’re only doing so with proven products. Boon Edam’s optical turnstiles have been installed globally and locally, and this gave us added confidence that they were the right product for this forward-looking project.” Enhanced building security “Another significant help with this project was that the companies involved built a prototype, located at Schindler’s Head Office based in Sydney, so that the Dexus management and technical teams could test the solution well in advance of implementing it at Gateway,” Hodge continued. He further stated, “It gave us peace of mind that we’d selected the right suppliers. We have tenants in Gateway who requested ground floor security, so we went out to tender to seek the best combination of sophisticated security and elegance, without being obtrusive to the building’s users.” Touchless fingerprint scanners for privacy Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building, because they provide an extra level of privacy that was attractive to tenants. “A computer algorithm converts each person’s unique fingerprint signature into binary code, zeroes and ones, and uses that code to grant access,” explained Mr. Hodge, adding “Boon Edam turnstiles have the ability to integrate facial recognition, which could be highly valuable in other projects, but the fingerprint scanners were the right fit for this building. Boon Edam made it simple to integrate the scanners with their optical turnstiles, which helped us meet project deadlines.” Effective management of system installations For such a complex project, installation always has its challenges, including managing installation work as people continue to use the building. Mr. Bill Garrett, Facility Manager at Gateway Building, was impressed by Boon Edam’s service and installation team. He said, “The Boon Edam installation team always ensured safety was the number one priority and they did a quality job, even with some very difficult-to-access areas.” Garrett adds, “I’m delighted with the result of the project. One of the major benefits of the new entry system is that there’s a dedicated underground entrance for tradespeople, couriers and deliveries, which removes congestion and bulky carts from the main lobby. It’s all about enhancing the user experience, and Gateway will set a new benchmark for a seamless, secure and aesthetically pleasing entry.” Staged approach towards system implementation The testing, combined with the staged approach, allowed for a smooth transition to the new security technology" Mr. Garrett explained that to get tenants used to a totally new system, they adopted a staged approach. At first, the turnstiles were put into place but left in the open position and after an initial period, some of the turnstiles were closed so that tenants could try entering using the new technology, if they wished. Finally, the entire system was fully implemented. “In addition to this staged approach, we met with key tenants and allowed them to test the system in advance. The testing, combined with the staged approach, allowed for a smooth transition to the new security technology,” said Garrett. Scope of touchless access control technologies Now that the technology has been successfully rolled out at Gateway, Dexus is looking at other locations that could utilise the same harmony of security technologies. “We are continuing to assess opportunities to implement touchless technologies in new developments as well as in our existing buildings,” said Mr. Hodge. “The stylish and secure entrance at Gateway has been ideal through the COVID-19 pandemic. It manages flow, queries guests on recent visits to pandemic hotspots, if they are feeling any symptoms, and can record all entrants to the building, helping us meet government requirements. And the same features will be beneficial in a broader context, too, to help mitigate against unauthorised entry,” concludes Hodge. Dexus is actively exploring the possibility of rolling out similar security entrance systems in other buildings, thereby delivering the seamless balance of security and elegance.
IDEMIA, the globally renowned company in Augmented Identity, moved to its new headquarters in September 2018, in an 11-floor building located in La Défense business district, in Paris, France. The building brings together 1,300 employees out of total worldwide staff strength of close to 15,000 people. Biometric access control Due to the sensitive nature of its activities in this building, and given its position on the biometrics market, IDEMIA decided to deploy biometric access control throughout the entire building, a first in this business district and a fantastic opportunity to showcase IDEMIA’s flagship products in real life. Most employees get to the office via nearby metro and tram stations, and therefore, arrive within the same 30-minute window. This creates the need for a high throughput access control solution, for entrance and exit peak-times. Access to the six elevators serving the eleven floors is given after a first control at speed gates in the lobby area. MorphoWave Compact devices deployed IDEMIA opted for MorphoWave Compact associated to Digicon’s dFlow speedgates IDEMIA opted for MorphoWave Compact associated to Digicon’s dFlow speedgates. MorphoWave Compact devices were mounted on a special stylish stainless steel pedestal. Four dFlow lanes were installed, with readers for entry and exit. MorphoWave Compact is IDEMIA’s flagship biometric device for physical access control. It performs a 3D scan and verification of four fingerprints in less than one second, in a quick and easy touchless ‘wave’ gesture within the reader. dFlow speedgates These features make the product particularly well-suited for such high-traffic locations, with the capability to authenticate up to 50 people per minute, thanks to advanced algorithms based on Artificial Intelligence. With dFlow speedgates, Digicon introduces a new vision for access control gates, one with continuous flows and normally open doors. dFlow enables free flow, ushering new levels of comfort and security. Frictionless biometric solution The installation is highly acclaimed by employees who appreciate the frictionless use of MorphoWave Compact and its natural ‘wave’ hand gesture, as well as Digicon’s ‘always open’ dFlow concept, that enables them to get to the elevators in only a few seconds. Of course, IDEMIA was well-placed for this biometric employee access control deployment, being the provider of MorphoWave Compact. The employees were immediately convinced by the frictionless and hygienic experience it offered them. The team in charge of the security of the building found the MorphoWave Compact and dFlow combination more secure and less intrusive than other access control systems. Most importantly, what is true for a company like IDEMIA will also be true for any company in need of a high level of security delivered in a frictionless and convenient way, especially in high-traffic locations like in an HQ lobby.
The 100 Mount Street premium-grade office tower completed in May 2019, is the tallest (152m) building in North Sydney. With an innovative cross-braced exoskeleton structure and a soaring glass curtain wall, the tower celebrates Sydney‘s history of excellence in architecture and structural engineering. The 35-story office tower offers panoramic views of Sydney Harbour, Sydney Opera House and Sydney Harbour Bridge, and is occupied by some of Sydney’s best-known companies. The site also benefits from its proximity to key transport infrastructures with a train station, bus stops, ferry wharf and taxi stand all within walking distance. This high traffic location required a convenient and secure way to ensure controlled access for the 2,000 people entering the building everyday, while maintaining the aesthetics of the 8 metres-high ceiling lobby. Efficient control access to the building In order to efficiently control access to the building, the security contractor supplied top quality COMINFO EasyGate SPT entrance control gates equipped with IDEMIA’s MorphoWave™ Compact high-end biometric contactless devices. COMINFO is an experienced manufacturer of turnstiles and speed gates. EasyGate SPT models were installed, equipped with the latest MDD motor technology (Magnetic Direct Drive: no gearbox, no oil, no brush) and advanced infrared optical sensors which ensure safe passage and detect tailgating and cross-over, to ensure that only authorised people can pass through the gates. MorphoWave Compact™ is the flagship biometric device for physical access control from IDEMIA, the front-runner in Augmented Identity. The terminal performs a 3D scan and verification of 4 fingerprints in less than 1-second, in a quick and easy touchless wave gesture. Aesthetic integration The features of the product are particularly well-suited for high traffic locations with the capability to authenticate up to 50 people per minute thanks to advanced algorithms based on Artificial Intelligence. COMINFO carried out an aesthetical integration of MorphoWave™ Compact into EasyGate SPT, resulting in a powerful solution that brings the latest physical access control system using only a simple wave of a hand. The project was deployed by Centaman, COMINFO’s partner for Australia/New Zealand. First to implement biometric technology Dexus and Dexus Wholesale Property Fund who owned the building were the first to implement this biometric technology in office buildings and have now more than 2,000 people registered with their biometrics, removing the need for physical access cards or touching anything when entering or leaving the secured premises. The installation is highly acclaimed by employees who appreciate the frictionless and hygienic use of MorphoWave™ Compact and EasyGate SPT.
Sharps Pixley is a British bullion house, formed in 1957 when two historic private bullion partnerships merged. In 2015 Sharps Pixley decided to put physical gold back on the streets of London via a flagship high street presence in St James’s Street, just off Piccadilly. In this very special shop, not only can customers buy products but they can also store them on-location in new, state-of-the-art safe deposit box facilities. Sharps Pixley needed to upgrade their ageing control system for their safe deposit box service. Old biometric system They were facing a number of challenges with their old biometric system which was substantially impacting customer experience and satisfaction: Capturing fingerprints during the enrolment phase, especially with older clients, would typically take several attempts. During the verification process, the shop operator faced similar issues thus requiring multiple system restarts to get the device working correctly. The software was unstable and would often crash. New additional functionalities were also required to be able to offer the correct secure services to the clients: Two person authentication to access a single safety deposit box. Manual authentication in addition to biometric identification. Replacing the key fob with a biometric solution. Access control technology Arana Security was contracted to help. Operating in the UK and Middle East, Arana Security specialises in biometric solutions, access control technology, surveillance and monitoring systems. They set about to design a new application for Sharps Pixley, to enhance the security, authentication and usability of the system - adding new next-level security clearance and a fresh and improved enrolment of clients’ biometrics. For the important biometric part, Arana Security and Sharp Pixley selected IDEMIA’s MorphoWave Compact contactless fingerprint device to enable fast, smooth and accurate verification of clients. MorphoWave Compact performs a 3D scan and verification of four fingerprints in less than one second, in a quick, easy and hygienic touchless hand wave gesture. Thanks to advanced algorithms based on Artificial Intelligence, the accuracy is very high, even with ageing fingers. Contactless biometric devices The system provided has improved the client’s service and provided a more robust, secure and reliable solution The implementation of MorphoWave Compact contactless biometric devices meant less time wasted at the desk waiting for confirmation of IDs and less stress on both the clients and employees. The system provided has significantly improved the client’s service and provided a more robust, secure and reliable solution. Sharps Pixley’s comments: “We approached the Arana team with a particularly unique set of problems to resolve including a security system that used hardware and software originally designed for a totally different purpose. I knew what I wanted but was not sure if it was possible. I was essentially an explorer deep in the jungle with a perfect map in my own head, but with no tools or machinery to hack my way out." Provides palpable reassurance "Arana did more than just clear a path for me to get to my destination - they paved the road for me afterwards. MorphoWave Compact device from IDEMIA is the icing on the cake that makes this all possible. Used properly it is refreshingly simple and intuitive. The team here and our clientele no longer struggle to manage or use our access system. The device itself provides palpable reassurance in the technology and that has true value”, says Bruno Garcia, Sharps Pixley.
Almabani General Contractors has a long robust history which began when the founders established the company in Jeddah, Saudi Arabia, in October of 1972. They are a family-owned company that remains true to its founders’ spirit, covenants, innovation and perseverance. Almabani General Contractors For four and a half decades, Almabani have been building up their expertise to serve an ever more demanding and challenging construction need in the region. In a prosperous economy fuelled by the oil boom, the company was positioned to participate in the execution of some of the most prestigious landmark projects in the Kingdom of Saudi Arabia. They have the highest classification in all civil and electrical works with in-house capabilities to develop design and value engineer solutions to cater to the customers’ needs. They have proudly executed projects from complex infrastructure works to heavy civil engineering structures. Engaged in highly competitive turnkey projects The company is engaged in highly competitive turnkey projects worth several billion dollars The company is engaged in highly competitive turnkey projects worth several billion dollars. To this end, Almabani continues to invest in quality, value engineering, proactive and talented people, endeavoring at all times to satisfy their customer’s expectations and to best serve the welfare of the society. Replacing decentralised access control systems Almabani General Contractors was using traditional decentralised access control & time-attendance systems in which they were facing the issue of excessive manual work and inaccurate data. Because of the poor quality of the existing biometric sensors, user fingerprints weren't recognised in the first attempt and the process was annoying and time-consuming. As the company is dealing with construction work, one of the major challenges for construction workers is accurate attendance marking despite dirty/stained fingers. Moreover, due to existing software limitations, many policies of access control and time-attendance couldn’t be implemented. As the existing system was decentralised, on-field employees faced issues while marking their attendance. Only basic reports could be prepared for attendance and access whereas they needed more customised reports because of various shifts and different contract workers. Moreover, third party integration was not possible in the earlier system. And last, but not the least, they were unsatisfied with support from the past supplier. Matrix access control and time-attendance solution Matrix solutions experts collaborated with the decision heads to understand the exact requirement and provide a cost-effective solution. After a comprehensive discussion, Matrix offered a centralised solution for all the locations. With the Matrix time-attendance and access control solution, the customer has overcome all the challenges. Now, it's possible for them to get control of all the locations from a single central location. Multispectral fingerprint sensor technology To stop inaccurate attendance marking, Matrix offered multispectral fingerprint sensor technology To overcome the problem of inaccurate attendance marking due to dirty/stained fingers, Matrix provided the multispectral fingerprint sensor technology which contains information about both the surface and the subsurface features of the skin. This technology gives a high throughput. They also acquired Palm Vein Reader for contactless authentication verification for the higher authorities. The solution from Matrix is fully customised with multiple shifts and attendance policies that can be applied to individual users. The smart mobile application for attendance marking and leave applications facilitate easy operation for users. Now, the customer is able to get the report of each employee with 200 different options. Auto-push technology With the auto-push technology, there is no need to transfer the data into the server. The data is automatically transferred to the server in real-time. The customer also got flexibility in terms of connectivity with 3G and WiFi options. The system from Matrix also provided the flexibility for easy integration with the third-party payroll system. Result: Accuracy in attendance management Centralised time-attendance and access control management High possibility of third-party integration User-friendly and fast process because of good quality sensor OEM support Contactless and advanced technology Flexibility in terms of integration, connectivity and credentials Products Offered: COSEC DOOR PVR – Palm Vein based Door Controller COSEC PATH DCFE – Biometric Fingerprint + RFID based Door Controller COSEC PATH DCCE – RFID based Door Controller COSEC PANEL LITE – Site Controller for Advanced Access Control Features COSEC LE PLATFORM – For 1500 + Users COSEC LE TAM – Time-Attendance Application Module COSEC LE ACM – Access Control Module COSEC LE ESS – Employees Self Service Module (Mobile App) COSEC INTEGRATION - Integration with In-house Payroll Software
Václav Havel Airport Prague (PRG), with its prime location in the Centre of Europe, is the largest and most important international airport in the Czech Republic. Prague Airport handled 17.8 million passengers in 2019 and received the Airport Service Quality Award 2019 awarded by ACI1 for the second time in a row. At Prague Airport, there are different types of areas restricted to authorised personnel. These are governed by an access control system fitted with approximately 1,000 readers and over 1,500 secured points (doors, locks, etc.). Mifare Desfire cards are predominantly in use for the time being. Among these, Security Restricted Areas (SRAs) are the highest security areas, with 60 access points of high importance. Contactless biometric technology Due to the critical nature of those areas, Prague Airport needed a very high level of security, and decided to implement a biometric solution, as the card itself (including with the use of a PIN code), would not be deemed as secure enough. The biometric system had to be able to cope with over 20,000 individuals, with the capability to increase to up to 30,000 users in the future. Prague Airport decided to keep the existing access cards but to add a biometric verification level for the SRAs. This means that the biometric solution would have to be used in combination with the existing cards through a two-step process. In order to avoid any physical contact with the devices, for user convenience as well as for hygienic considerations, it was decided to deploy a contactless biometric technology. Access control system The readers were installed at existing control points and are fully integrated into the airport access control system Prague Airport tested two technologies capable of connecting to its access control system, among which IDEMIA’s MorphoWave Compact contactless fingerprint terminal. After a thorough testing period, the choice was to go for IDEMIA’s technology for a number of reasons including: great user experience with an easy and quick hand gesture, as well as a strict GDPR compliance with users’ biometric information stored only in their cards. Prague Airport deployed more than 60 MorphoWave Compact in its SRAs. The readers were installed at existing control points and are fully integrated into the airport access control system. More than 20,000 users now have their biometric data in their access cards and the system is fully operational. Embedded card reader IDEMIA’s seamless biometric technology helps address health and safety issues. Employees appreciate the user experience provided by the solution deployed: it is easy to tap the access card onto the embedded card reader situated at the top of the reader and then to just wave the hand in a quick simple movement to get 4 fingerprint verified in less than 1 second, without the need to touch any part of the device. Airports is a key vertical among the many different ones served by IDEMIA. The biometric devices are used by 35+ of them throughout the world for staff access control, as here in Prague. The company’s biometric solutions are also used for border control and passenger flow facilitation, in more than 30 different airports.
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Among its many uses and benefits, technology is a handy tool in the fantasy world of movie and television thrillers. We all know the scene: a vital plot point depends on having just the right super-duper gadget to locate a suspect or to get past a locked door. In movies and TV, face recognition is more a super power than a technical function. Video footage can be magically enhanced to provide a perfect image of a license plate number. We have all shaken our heads in disbelief, and yet, our industry’s technical capabilities are improving every day. Are we approaching a day when the “enhanced” view of technology in movies and TV is closer to the truth? We asked this week’s Expert Panel Roundtable: How much has the gap closed between the reality of security system capabilities and what you see on TV (or at the movies)?
How to ramp up perimeter security with license plate reader technologyDownload
Solve access control challenges in the healthcare sectorDownload
Getting the most value from Software Subscription AgreementsDownload
Shifting trends in operation centers and control rooms for 2021Download